<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>MPhil Thesis</title>
<link href="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/420" rel="alternate"/>
<subtitle/>
<id>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/420</id>
<updated>2026-04-06T20:56:16Z</updated>
<dc:date>2026-04-06T20:56:16Z</dc:date>
<entry>
<title>Securing Graphical Authentication Using Keystroke Dynamics</title>
<link href="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795" rel="alternate"/>
<author>
<name>Roy, Indrani</name>
</author>
<id>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795</id>
<updated>2026-03-03T07:45:46Z</updated>
<published>2026-03-03T00:00:00Z</published>
<summary type="text">Securing Graphical Authentication Using Keystroke Dynamics
Roy, Indrani
Account recovery is a critical aspect of web application security, often overlooked&#13;
despite its importance. Traditional account recovery methods, such as sending a&#13;
password reset link or a new username to the user’s registered email, are vulnerable&#13;
to impostors who may have access to the user’s email and other credentials.&#13;
This vulnerability makes account recovery a potential weak point in the overall security&#13;
of a web application. Recent applications of behavioral biometrics, such as&#13;
keystroke dynamics, for attack detection and user authentication bear similarities&#13;
to biometric authentication. Adding keystroke dynamics analysis to the account&#13;
recovery process significantly increases the difficulty for an impostor to successfully&#13;
recover and take over a user’s account. To enhance user authentication effectiveness&#13;
and raise account recovery requirements through keystroke dynamics, this&#13;
study adds one additional measure of keystroke patterns to the already-existing&#13;
features. Compared to other access control systems based on biometric features&#13;
like face or fingerprint, keystroke analysis has attained a respectable level of accuracy.&#13;
In this aim, this study uses experimental data and statistical analysis to&#13;
show how the unique keystroke measure provided may be utilized in conjunction&#13;
with the current authentication mechanism to greatly improve the authentication&#13;
and security of sensitive applications. It may be beneficial to recognize the intruders&#13;
and expel them from the system as long as this job can accommodate their&#13;
typing rhythm. In this study, generative adversarial networks (GAN) are utilized&#13;
to generate keyboard dynamics data with a focus on impersonating a user at the&#13;
identification step in both fixed text and fixed sentence contexts. Three distinct&#13;
architectures have been devised, implemented, and validated with the aid of machine&#13;
learning and deep learning: vanilla-GAN based on simple neural networks&#13;
NN, LSTM-GAN based on recurrent neural networks using long short-term memories&#13;
(LSTM), CNN-GAN based on convolutional neural networks. The developed&#13;
Conditional Generative Adversarial Networks have shown that these architectures&#13;
can successfully replicate a user’s keystroke dynamics by learning about the user’s&#13;
typing style and generating keyboard dynamics data using different GANs with&#13;
different architectural styles. Findings show that keystroke dynamics patterns can&#13;
be efficiently produced by the GAN and utilized to trick keystroke authentication&#13;
systems.
This thesis is submitted for the degree of Master of Philosophy.
</summary>
<dc:date>2026-03-03T00:00:00Z</dc:date>
</entry>
<entry>
<title>Session keys for secured electronic transactions</title>
<link href="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4661" rel="alternate"/>
<author>
<name>Jabiullah, M. Ismail</name>
</author>
<id>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4661</id>
<updated>2025-05-27T04:36:20Z</updated>
<published>2025-05-27T00:00:00Z</published>
<summary type="text">Session keys for secured electronic transactions
Jabiullah, M. Ismail
This thesis is submitted for the degree of Master of Philosophy.
</summary>
<dc:date>2025-05-27T00:00:00Z</dc:date>
</entry>
<entry>
<title>Solar heated hot water systems</title>
<link href="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/3896" rel="alternate"/>
<author>
<name>Khan, Taskina</name>
</author>
<id>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/3896</id>
<updated>2025-03-11T09:24:49Z</updated>
<published>2025-03-11T00:00:00Z</published>
<summary type="text">Solar heated hot water systems
Khan, Taskina
This thesis is submitted for the degree of Master of Philosophy.
</summary>
<dc:date>2025-03-11T00:00:00Z</dc:date>
</entry>
<entry>
<title>User Authentication from Mouse Movement Data Using Multi Classifier</title>
<link href="http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/424" rel="alternate"/>
<author>
<name>Karim, Masuda</name>
</author>
<id>http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/424</id>
<updated>2019-10-07T09:55:23Z</updated>
<published>2019-10-07T00:00:00Z</published>
<summary type="text">User Authentication from Mouse Movement Data Using Multi Classifier
Karim, Masuda
User authentication is a process to verify the identity of someone who connects to system or resource. There are many technologies to authenticate a user. The biometric authentication system is becoming very popular due to its unique characteristics. This thesis presents a user authentication system from the mouse movement data. The mouse movement data are captured using our own developed user interface and two tools named Jitbit macro reader and Recording User Input (RUI). Raw data are sampled into blocks in two ways: one is based on specific number of action and another is based on specific duration. These data blocks are stored in database. From each blocks, twelve features are generated: Number of Points in the Trajectory, Delay Time, Number of Delay, Number of Action, Standard Deviation of Trajectory Length, Total Length of Trajectory, Standard Deviation of Slope, Standard Deviation of Difference Between Each of Slopes, Number of Curvatures, Curvature of Trajectory, Number of Changes in Horizontal Position and Number of Changes in Vertical Position. This system uses three classifiers: Support Vector Machine, K-Nearest Neighbor and Naïve Bayes separately to verify the proposed authentication system. The system is trained and tested using our captured dataset of 10 users and a benchmark dataset of 28 users. The experimental result shows that K-Nearest Neighbor based classifier performs better in terms of Average Receiver Operating Characteristic (ROC) Area, False Acceptance Rate (FAR) and False Rejection Rate (FRR). We have found FAR=2.78 and FRR=0 by using our collected own data and FAR=1 and FRR=1.2 by using benchmark data. This system is compared with S. Suganya, G. Muthumari, and C. Balasubramanian’s research and found that both FAR and FRR is improved.
This thesis submitted for the degree of Master of Philosophy in The University of Dhaka.
</summary>
<dc:date>2019-10-07T00:00:00Z</dc:date>
</entry>
</feed>
